The document describes an advanced vehicle security system that uses fingerprint identification technology. It scans the driver's fingerprint and only allows the vehicle to start if there is a match with an enrolled fingerprint. This prevents theft even if someone has access to the vehicle keys. The system can also send text messages to the owner's phone with the vehicle's status or if any impacts are detected while it is parked. It aims to implement a fingerprint recognition algorithm to extract features like minutiae from fingerprint images and perform matching.
1. ADVANCED VEHICLE SECURITY SYSTEM
Chapter 1
INTRODUCTION
The system uses the latest fingerprint ID scan technology to make sure only
authorized drivers with enrolled fingerprints can start the vehicle. The primary
security system uses a combination of an enrolled Fingerprint and the vehicle key
to enable the vehicle ignition. It means that even if someone gets a hold of user's
keys the vehicle is still safeguarded from theft and misuse. The system also allows
user to send text commands from his mobile phone to the unit to receive important
status messages or temporarily disable certain features.
1.1 Motivation
The method that is selected for fingerprint matching was first discovered by Sir
Francis Galton. In 1888 he observed that fingerprints are rich in details also called
minutiae in form of discontinuities in ridges. He also noticed that position of those
minutiae doesnât change over the time. Therefore minutiae matching are a good
way to establish if two fingerprints are from the same person or not.
Automatization of the fingerprint recognition process turned out to be success in
forensic applications. Achievements made in forensic area expanded the usage of
the automatic fingerprint recognition into the civilian applications. Fingerprints
have remarkable permanency and individuality over the time. The observations
showed that the fingerprints offer more secure and reliable person identification
than keys, passwords or id-cards can provide.
Maybe the neighbourhood kids keep hitting user's vehicle while playing ball, an
SMS message will be instantly sent to admin phone telling that something hit the
vehicle. With this handy feature user wonât ever have to wonder where those
dings and dents magically appear from, user will literally be able to catch them
while they are happening. The system also allows user to send text commands
from his mobile phone to the unit to receive important status messages or
temporarily disable certain features.
âDepartment of Electronics & Telecommunication Engineering, MCERC,Nasik.2013-14â
Page 1
2. ADVANCED VEHICLE SECURITY SYSTEM
1.2 Objective
The objective is to implement fingerprint recognition algorithm. The Region of
Interest (ROI) for each fingerprint image is extracted after enhancing its quality.
The concept of Crossing Number is used to extract the minutia, followed by false
minutiae elimination. An alignment based matching algorithm is then used for
minutia matching.
1.3 Report Organization
At the very first this reports explores a detailed idea about the topic and the related
information. The overall concern of the work is explained.
ī Chapter 1 Introduces basic concept of Fingerprint technology. The Motivation
behind the area of interest and objectives also has been explained.
ī Chapter 2 Discusses the problems of stealing of vehicles and various techniques.
This chapter reviews number of vehicles stolen year by year .
ī Chapter 3 Reviews the system development of vehicle security system. It gives
the brief idea about Fingerprint technology, GSM module, Microcontroller 16X2
LCD, Relay driver,RS232, Power supply.
ī Chapter 4 Presents implementation of circuit description of power supply and
proposed system.
ī Chapter 5 Explores simulators used for implementation of vehicle security
system like EMBEDDED âCâ, PROTEUS, EAGLE and also reviews its
features.
ī Chapter 6 Conclusion.
ī Chapter 7 Summary.
ī Chapter 8 References.
âDepartment of Electronics & Telecommunication Engineering, MCERC,Nasik.2013-14â
Page 2
3. ADVANCED VEHICLE SECURITY SYSTEM
Chapter 2
LITERATURE SURVEY
Motor vehicle theft (sometimes referred to as grand theft auto by the media
and police departments in the US) is the criminal act of stealing or attempting to
steal a car. Nationwide in the US in 2005, there were an estimated 1.2 million
motor vehicle thefts, or approximately 416.7 motor vehicles stolen for every
100,000 inhabitants. Property losses due to motor vehicle theft in 2005 were
estimated at $7.6 billion. The most recent statistics, for 2009, show an estimated
794,616 thefts of motor vehicles nationwide, representing property losses of
nearly $5.2 billion.
Some methods used by criminals to steal motor vehicles include:
ī Theft of an unattended vehicle without key(s): The removal of a parked
vehicle either by breaking and entry, followed by hotwiring or other
tampering methods to start the vehicle, or else towing.
ī Theft with access to keys: Known in some places as "Taken Without
Owner's Consent (TWOC)". The unauthorized use of a vehicle in which
the owner has allowed the driver to have possession of or easy access to
the keys.
ī Opportunistic theft: The removal of a vehicle that the owner or operator
has left unattended with the keys visibly present, sometimes idling.
ī Carjacking: Refers to the taking of a vehicle by force or threat of force
from its owner or operator. In most places, this is the most serious form of
theft, since assault also occurs. In some car jackings, the operators and
passengers are forced from the vehicle while the thief drives it away
him/herself, while in other incidents, the operator and/or passenger(s) are
forced to remain in the vehicle as hostages.
ī Fraudulent theft: Illegal acquisition of a vehicle from a seller through
fraudulent transfer of funds that the seller will ultimately not receive (such
as by identity theft or the use of a counterfeit cashier's check). Many
vehicles stolen in this manner are resold quickly thereafter.
âDepartment of Electronics & Telecommunication Engineering, MCERC,Nasik.2013-14â
Page 3
4. ADVANCED VEHICLE SECURITY SYSTEM
Fig.2.1 Percentage of vehicle robbed in year 2009-2010
In Thailand, the most frequently stolen vehicles are Toyota and Nissan cars,
Isuzu pickup trucks, Honda cars, and Honda motorcycles (2007 data).
In Malaysia, Selangor had the highest number of motor vehicle thefts, ahead of
Kuala Lumpur and Johor. Since 2005, Proton models are the most frequently
stolen vehicles in the country, with Proton Wira being the highest, followed by
the Proton Waja and the Proton Perdana.
An anti-theft system is any device or method used to prevent or deter the
unauthorized appropriation of items considered valuable. Theft is one of the most
common and oldest criminal behaviours. From the invention of the
first lock and key to the introduction of RFID tags and biometric identification,
anti-theft systems have evolved to match the introduction of new inventions to
society and the resulting theft of them by others.
âDepartment of Electronics & Telecommunication Engineering, MCERC,Nasik.2013-14â
Page 4
5. ADVANCED VEHICLE SECURITY SYSTEM
There are various methods of prevention to reduce the likelihood of a vehicle
getting stolen. These include physical barriers, which make the effort of stealing
the vehicle more difficult. Some of these include:
ī Devices used to lock a part of the vehicle necessary in its operation, such
as the wheel, steering wheel or brake pedal. A popular steering wheel lock
is The Club.
ī Immobilizers, allowing the vehicle to start only if a key containing the
correct chip is present in the ignition. These work by locking the steering
wheel and disabling the ignition.
ī Chances of theft can also be reduced with various deterrents, which give
the impression to the thief that s/he is more likely to get caught if the
vehicle is stolen. These include:
ī Car alarm systems that are triggered if a breaking and entry into the
vehicle occurs
ī Microdot identification tags which allow individual parts of a vehicle to
be identified
ī Kill switch circuits are designed to frustrate or slow down the efforts of a
determined car thief. Kill switches are often located between crucial parts
of the starting system, between the battery source and the coil, or the fuel
pump. A car cannot start without first flipping these kill switches to closed
position. Savvy car owners hide these kill switches in obscured areas,
under the dashboard, beneath the seat, behind a chair, etc.
ī Signage on windows warning of the presence of other deterrents,
sometimes in absence of the actual deterrents.
ī VIN etching
The ultimate solution in vehicle theft prevention, one complete system that has a
fingerprint ignition lock, dual band GSM (900/1800) messaging system. With this
one vehicle security system user can have total piece of mind knowing that his
vehicle isnât going anywhere it shouldnât be.
âDepartment of Electronics & Telecommunication Engineering, MCERC,Nasik.2013-14â
Page 5
6. ADVANCED VEHICLE SECURITY SYSTEM
Chapter 3
SYSTEM DEVELOPMENT
3.1 BLOCK DIAGRAM
Fig.3.1 Block Diagram of the system
âDepartment of Electronics & Telecommunication Engineering, MCERC,Nasik.2013-14â
Page 6
7. ADVANCED VEHICLE SECURITY SYSTEM
3.1.1
ALGORITHM
ī Firstly user will insert the key; the system will automatically detect the key
insertion.
ī User will be asked to keep thumb on the fingerprint scanner.
ī System will scan the finger & will verify with already stored-enrolled one.
ī User can enrol as many no. of fingers as he/she wants.
ī After verification ignition will activate automatically.
ī If the finger is invalid then automatically one SMS will be transferred to the
registered mobile no.
ī If the car is parked then the system will monitor the body of the car for any
vibration.
ī If found then the system will send SMS to the owner.
ī Even if the car comes in motion in the parking mode; SMS will be
delivered.
3.1.2 FINGER PRINT MODULE
Fingerprint Sensing
There are two primary methods of capturing a fingerprint image: inked (off-line)
and live scan (ink-less). An inked fingerprint image is typically acquired in the
following way: a trained professional obtains an impression of an inked finger on
a paper and the impression is then scanned using a flat bed document scanner. The
live scan fingerprint is a collective term for a fingerprint image directly obtained
from the finger without the intermediate step of getting an impression on a paper.
Acquisition of inked fingerprints is cumbersome; in the context of an identity
authentication system, it is both infeasible and socially unacceptable. The most
popular technology to obtain a live-scan fingerprint image is based on optical
frustrated total internal reflection (FTIR) concept. When a finger is placed on one
side of a glass platen (prism), ridges of the finger are in contact with the platen,
while the valleys of the finger are not in contact with the platen. The rest of the
imaging system essentially consists of an assembly of an LED light source and a
CCD placed on the other side of the glass platen. The laser light source
âDepartment of Electronics & Telecommunication Engineering, MCERC,Nasik.2013-14â
Page 7
8. ADVANCED VEHICLE SECURITY SYSTEM
illuminates the glass at a certain angle and the camera is placed such that it can
capture the laser light reflected from the glass. The light incident on the platen at
the glass surface touched by the ridges is randomly scattered while the light
incident at the glass surface corresponding to valleys suffers total internal
reflection. Consequently, portions of the image formed on the imaging plane of
the CCD corresponding to ridges is dark and those corresponding to valleys is
bright. More recently, capacitance-based solid state live-scan fingerprint sensors
are gaining popularity since they are very small in size and hold promise of
becoming inexpensive in the near future. A capacitance-based fingerprint sensor
essentially consists of an array of electrodes. The fingerprint skin acts as the other
electrode, thereby, forming a miniature capacitor. The capacitance due to the
ridges is higher than those formed by valleys. This differential capacitance is the
basis of operation of a capacitance-based solid state sensor6
Fingerprint Representation
Fingerprint representations are of two types: local and global. Major
representations of the local information in fingerprints are based on the entire
image, finger ridges, pores on the ridges, or salient features derived from the
ridges. Representations predominantly based on ridge endings or bifurcations
(collectively known as minutiae (see Figure 1) are the most common, primarily
due to the following reasons: (i) minutiae capture much of the individual
information, (ii) minutiae-based representations are storage efficient, and (iii)
minutiae detection is relatively robust to various sources of fingerprint
degradation. Typically, minutiae-based representations rely on locations of the
minutiae and the directions of ridges at the minutiae location. Some global
representations include information about locations of critical points (e.g., core
and delta) in a fingerprint.
âDepartment of Electronics & Telecommunication Engineering, MCERC,Nasik.2013-14â
Page 8
9. ADVANCED VEHICLE SECURITY SYSTEM
Fig.3.2 Ridge ending and bifurcation.
Feature Extraction:
A feature extractor finds the ridge endings and ridge bifurcations from the input
fingerprint images. If ridges can be perfectly located in an input fingerprint image,
then minutiae extraction is just a trivial task of extracting singular points in a
thinned ridge map. However, in practice, it is not always possible to obtain a
perfect ridge map. The performance of currently available minutiae extraction
algorithms depends heavily on the quality of the input fingerprint images. Due to a
number of factors (aberrant formations of epidermal ridges of fingerprints,
postnatal marks, occupational marks, problems with acquisition devices, etc.),
fingerprint images may not always have well-defined ridge structures.
A reliable minutiae extraction algorithm is critical to the performance of an
automatic identity authentication system using fingerprints. The overall flowchart
of a typical algorithm7,8 is depicted in Figure 2.
It mainly consists of three components: (i) Orientation field estimation, (ii) ridge
extraction, and (iii) minutiae extraction and post processing.
âDepartment of Electronics & Telecommunication Engineering, MCERC,Nasik.2013-14â
Page 9
10. ADVANCED VEHICLE SECURITY SYSTEM
Fig.3.3 Flow of the minutiae extraction
Orientation Estimation
The orientation field of a fingerprint image represents the directionality of ridges
in the fingerprint image. It plays a very important role in fingerprint image
analysis. A number of methods have been proposed to estimate the orientation
field of fingerprint images. Fingerprint image is typically divided into a number
of non-overlapping blocks (e.g., 32 x 32 pixels) and an orientation representative
of the ridges in the block is assigned to the block based on an analysis of
grayscale gradients in the block. The block orientation could be determined from
the pixel gradient orientations based on, say, averaging, voting, or optimization.
âDepartment of Electronics & Telecommunication Engineering, MCERC,Nasik.2013-14â
Page 10
11. ADVANCED VEHICLE SECURITY SYSTEM
Segmentation
It is important to localize the portions of fingerprint image depicting the finger
(foreground). The simplest approaches segment the foreground by global or
adaptive thresholding. A novel and reliable approach to segmentation exploits the
fact that there is significant difference in the magnitudes of variance in the gray
levels along and across the flow of a fingerprint ridge. Typically, block size for
variance computation spans 1-2 inter-ridge distance.
ī Ridge Detection: The approaches to ridge detection use either simple or
adaptive thresholding. These approaches may not work for noisy and low
contrast portions of the image. An important property of the ridges in a
fingerprint image is that the gray level values on ridges attain their local
maxima along a direction normal to the local ridge orientation. Pixels can
be identified to be ridge pixels based on this property. The extracted ridges
may be thinned/cleaned using standard thinning and connected component
algorithms.
ī Minutiae Detection: Once the thinned ridge map is available, the ridge
pixels with three ridge pixel neighbors are identified as ridge bifurcations
and those with one ridge pixel neighbor identified as ridge endings.
However, all the minutia thus detected are not genuine due to image
processing artifacts and the noise in the fingerprint image.
ī Post processing: In this stage, typically, genuine minutiae are gleaned
from the extracted minutiae using a number of heuristics. For instance, too
many minutiae in a small neighborhood may indicate noise and they could
be discarded. Very close ridge endings oriented anti-parallel to each other
may indicate spurious minutia generated by a break in the ridge due either
to poor contrast or a cut in the finger. Two very closely located
bifurcations sharing a common short ridge often suggest extraneous
minutia generated by bridging of adjacent ridges as a result of dirt or
image processing artifacts.
Minutiae Extraction
The most commonly employed method of minutiae extraction is the Crossing
Number (CN) concept. This method involves the use of the skeleton image where
âDepartment of Electronics & Telecommunication Engineering, MCERC,Nasik.2013-14â
Page 11
12. ADVANCED VEHICLE SECURITY SYSTEM
the ridge flow pattern is eight-connected. The minutiae are extracted by scanning
the local neighborhood of each ridge pixel in the image using a 3 x 3 window. The
CN value is then computed, which is defined as half the sum of the differences
between pairs of adjacent pixels in the eight-neighborhood. Using the properties
of the CN as shown in Table 1, the ridge pixel can then be classified as a ridge
ending, bifurcation or non-minutiae point. For example, a ridge pixel with a CN of
one corresponds to a ridge ending, and a CN of three corresponds to a bifurcation.
After the CN for a ridge pixel has been computed, the pixel can then be classified
according to the property of its CN value. As shown in Figure 3, ridge pixel with a
CN of one corresponds to a ridge ending, and a CN of three corresponds to a
bifurcation. For each extracted minutiae point, the following information is
recorded:
ī
x and y coordinates,
ī
orientation of the associated ridge segment, and
ī
type of minutiae (ridge ending or bifurcation).
Fig.3.4 Examples of a ridge ending and bifurcation pixel.
(a) A Crossing Number of one corresponds to a ridge ending pixel.
(b) A Crossing Number of three corresponds to a bifurcation pixel.
âDepartment of Electronics & Telecommunication Engineering, MCERC,Nasik.2013-14â
Page 12
13. ADVANCED VEHICLE SECURITY SYSTEM
Fingerprint Matching
Given two (input and template) sets of features originating from two fingerprints,
the objective of the feature matching system is to determine whether or not the
prints represent the same finger. Fingerprint matching has been approached from
several different strategies, like image-based, ridge pattern-based, and point
(minutiae) pattern-based fingerprint representations. There also exist graph-based
schemes for fingerprint matching. Image-based matching may not tolerate large
amounts of non-linear distortion in the fingerprint ridge structures. Matchers
critically relying on extraction of ridges or their connectivity information may
display drastic performance degradation with a deterioration in the quality of the
input fingerprints. Therefore, point pattern matching (minutiae matching)
approach facilitates the design of a robust, simple, and fast verification algorithm
while maintaining a small template size.
The matching phase typically defines the similarity (distance) metric between two
fingerprint representations and determines whether a given pair of representations
is captured from the same finger (mated pair) based on whether this quantified
similarity is greater (less) than a certain (predetermined) threshold. The similarity
metric is based on the concept of correspondence in minutiae-based matching. A
minutiae in the input fingerprint and a minutiae in the template fingerprint are said
to be corresponding if they represent the identical minutiae scanned from the same
finger. Before the fingerprint representations could be matched, most minutiabased matchers first transform (register) the input and template fingerprint
features into a common frame of reference.
The registration essentially involves alignment based on rotation/translation and
may optionally include scaling. The parameters of alignment are typically
estimated either from (i) singular points in the fingerprints, e.g., core and delta
locations; (ii) pose clustering based on minutia distribution; or (iii) any other
landmark features.
For example, Jain et al use a rotation/translation estimation method based on
properties of ridge segment associated with ridge ending minutiae.
âDepartment of Electronics & Telecommunication Engineering, MCERC,Nasik.2013-14â
Page 13
14. ADVANCED VEHICLE SECURITY SYSTEM
There are two major challenges involved in determinating the correspondence
between two aligned fingerprint representations: (i) dirt/leftover smudges on the
sensing device and the presence of scratches/cuts on the finger either introduce
spurious minutiae or obliterate the genuine minutiae; (ii) variations in the area of
finger being imaged and its pressure on the sensing device affect the number of
genuine minutiae captured and introduce displacements of the minutiae from their
âtrueâ locations due to elastic distortion of the fingerprint skin. Consequently, a
fingerprint matcher should not only assume that the input fingerprint is a
transformed template fingerprint by a similarity transformation (rotation,
translation, and scale), but it should also tolerate both spurious minutiae as well as
missing genuine minutiae and accommodate perturbations of minutiae from their
true locations.
The adaptive elastic string matching algorithm summarized in this chapter uses
three attributes of the aligned minutiae for matching: its distance from the
reference minutiae (radius), angle subtended to the reference minutiae (radial
angle), and local direction of the associated ridge (minutiae direction). The
algorithm initiates the matching by first representing the aligned input (template)
minutiae as an input (template) minutiae string. The string representation is
obtained by imposing a linear ordering based on radial angles and radii. The
resulting input and template minutiae strings are matched using an inexact string
matching algorithm to establish the correspondence.
The inexact string matching algorithm essentially transforms (edits) the input
string to template string and the number of edit operations is considered as a
metric of the dissimilarity between the strings. While permitted edit operators
model the impression variations in a representation of a finger (deletion of the
genuine minutiae, insertion of spurious minutiae, and perturbation of the
minutiae), the penalty associated with each edit operator models the likelihood of
that edit. The sum of penalties of all the edits (edit distance) defines the similarity
between the input and template minutiae strings. Among several possible sets of
edits that permit the transformation of the input minutiae string into the reference
minutiae string, the string matching algorithm chooses the transform associated
with the minimum cost based on dynamic programming.
âDepartment of Electronics & Telecommunication Engineering, MCERC,Nasik.2013-14â
Page 14
15. ADVANCED VEHICLE SECURITY SYSTEM
The algorithm tentatively considers a candidate (aligned) input and a candidate
template minutiae in the input and template minutiae string to be a mismatch if
their attributes are not within a tolerance window (see Figure 6) and penalizes
them for deletion/insertion edit. If the attributes are within the tolerance window,
the amount of penalty associated with the tentative match is proportional to the
disparity in the values of the attributes in the minutiae. The algorithm
accommodates for the elastic distortion by adaptively adjusting the parameters of
the tolerance window based on the most recent successful tentative match. The
tentative matches (and correspondences) are accepted if the edit distance for those
correspondences is smaller than any other correspondences.
Fig.3.5 Bounding box and its adjustment.
âDepartment of Electronics & Telecommunication Engineering, MCERC,Nasik.2013-14â
Page 15
16. ADVANCED VEHICLE SECURITY SYSTEM
Figure 3.6 shows the results of applying the matching algorithm to an input and a
template minutiae set pair. The outcome of the matching process is defined by a
matching score. Matching score is determined from the number of mated minutia
from the correspondences (see Figure 3.7) associated with the minimum cost of
matching input and template minutiae string. The raw matching score is
normalized by the total number of minutia in the input and template fingerprint
representations and is used for deciding whether input and template fingerprints
are mates. The higher the normalized score, the larger the likelihood that the test
and template fingerprints are the scans of the same finger.
Fig3.6 Results of applying the matching algorithm to an input minutiae set
and a template; (a) input minutiae set; (b) template minutiae set; (c) alignment
result based on the minutiae marked with green circles; (d) matching result where
template minutiae and their correspondences are connected by green lines.
âDepartment of Electronics & Telecommunication Engineering, MCERC,Nasik.2013-14â
Page 16
18. ADVANCED VEHICLE SECURITY SYSTEM
Features
ī Supply voltage : 12V DC.
ī Baud rate : 9600.
ī Data bits : 8.
ī SMS storage : SIM card.
ī Operating temperature : -20 to 55 â .
ī GPRS data : Uplink transfer 42.8kbps.
Downlink transfer 85.6kbps.
ī External antenna : Connected via 50 ohm antenna connector.
1. Baud rate notice
SIM300, SIM300C, SIM306, SIM300D, SIM508 SIM340, SIM340C, SIM340D,
SIM548 baud rate is auto-bauding, AT+IPR=0 is default configuration, when
module is shipped from SIMCom, module does not feedback any information.
Suggest you fix it: AT+IPR=9600;&w as your request. If you restart module, it
will feedback as SIM100S32-E old module:
RDY +CFUN: 1 etc And you can configure module by some AT command, like
AT, ATI, AT+CSQ, AT+CREG?, AT+CGATT?, etc.
And after you get CALL READY from SIM300, you can setup SMS or phone etc
AT as your need.
2. How to call and answer a coming call?
Phone 010-65802113 call SIM300( 13910000111), then you can get Ring from
hyper terminal software, or call-ring from earphone, ATA to answer this coming
call, ATH to hang up it, ATD01065802113; SIM300 dials 010-65802113, Use
AT+VTS=â8,8,8â to dial external phone number 888.
3. How to display incoming calling number?
How to get SIM300âs SIM card number?
AT+CLIP=1 // check dialed SIM card open this function OK RING +CLIP:
"01065802113",129 // incoming call number01065802113 OK ATH Get SIM
card number: AT+CPBS="ON" OK AT+CPBW=1,"139100001111" OK AT&W
OK AT+CNUM +CNUM: "","139100001111",129,7,4
4. How to start a time-counter when answering a call?
âDepartment of Electronics & Telecommunication Engineering, MCERC,Nasik.2013-14â
Page 18
19. ADVANCED VEHICLE SECURITY SYSTEM
AT+COLP=1 // setup to count time when receive call OK ATD01065802116;
// awaiting, but not receive call, not start to open timer OK // answer this call, it
start to count time ATH
5. How to configure voice channel?
AT+CHFA=1 // change handset to earphone(Switched aux audio), OK // default is
handset(main audio, 0) AT+CHFA=0 // main audio For aux audio channel
( earphone) Echo noise suppression AT+ECHO=20000,5,15,1 // normal
AT+ECHO=20500,4,15,1
//
If
some
Echo
exist,
do
as
this
line
AT+ECHO=19500,6,15,1 // If canât hear pear-side voice For main audio channel
( handset) Echo noise suppression AT+ECHO=30000,5,10,0 // normal
AT+ECHO=30500,4,10,1
//
If
some
Echo
exist,
do
as
this
line
AT+ECHO=29500,6,10,1 // If canât hear pear-side voice AT+CMIC? //
Microphone volume +CMIC:2,2 OK AT+CRSL? // Ring volume +CRSL: 100 OK
AT+SIDET? // Side volume +SIDET: 4096 OK
6. How to send English text SMS to 13910000112?
AT+CMGF=1 OK AT+CSCS=âGSMâ OK AT+CMGS=â13910000112â > Hello
world // then Ctrl Z at the same time +CMGS: 158 // finished
7. How to send PDU mode Chinese text SMS?
AT+CMGF=0
OK
AT+CSCS=âUCS2â
AT+CMGS=019
//
15+4
>
0011000D91683119000011f2000801044f60597d // Ctrl Z // 13910000112 æ¨åĨŊ
+CMGS: 159
8. How to send Chinese text SMS?
AT+CMGF=1 OK AT+CSCS=âUCS2â OK AT+CSMP=17,167,0,24 OK
AT+CMGS= "00310033003900310030003000300030003100310032"
> 67688559660e // send æ¨čæ to 13910000112 +CMGS: 160
9. How to read a SMS, delete a SMS?
AT+CMGF=1 OK AT+CMGR=2+CMGR:"REC UNREAD","+8613911000147",
,"07/03/01,11:20:28+32" test // content is test AT+CMGD=2 OK AT+CMGR=2
OK // means it is empty
10. How to check if pear-side get a sent SMS?
AT+CSMP=49,167,0,241 // 49: 17 is default, // 241: if 24,25 for UCS2, // 241: if
240 pear-side can only see, can not save this SMS, // 241: if 241 pear-side can
âDepartment of Electronics & Telecommunication Engineering, MCERC,Nasik.2013-14â
Page 19
20. ADVANCED VEHICLE SECURITY SYSTEM
save it AT+CNMI=2,1,2,1,0 AT+CMGF=1 OK AT+CSCS=âGSMâ OK
AT+CMGS=â13910000112â > Hello world // then Ctrl Z at the same time
+CMGS: 161 // finished
+CDS:,36,"+8613911000147",145,"07/03/01,11:10:43+32","07
/03/01,11:10:43+32",0,2,1,2,1,0
11. Common AT command ( including GSM, GPRS AT)
AT
//
at
OK
ATI
SIMCOM_Ltd
SIMCOM_SIM300
Revision:
1008B10SIM300S32_(SPANSION)SIMCOM_Ltd AT+CSQ // How to check RF
signal strength +CSQ: 29,0 OK AT+CREG? +CREG: 0,1 // GSM network is OK
OK AT+CGATT? +CGATT: 1 // GPRS is active, 0: de-active OK
AT+CIPSTATUS
//
check
GPRS
status
STATE:
CONNECT
OK
AT+CIPDPDP=1,10,3 // if antenna is turn off OK +PDP: DEACT // after about 3
minutes, GPRS is de-active AT+CIPSHUT // Close GPRS AT+CGATT=0 //
Close GPRS AT+CFUN=0,1 // Close GPRS AT+CPOWD=1 // Close GPRS
NORMAL POWER DOWN, AT+CPIN? // How to check SIM card +CPIN:
READY RDY +SCKS:0 // means: SIM card is not inserted AT+GSN // IMEI
number of SIM300 module 355117001512899 OK
3.1.4 RS 232 CONNECTOR
Fig 3.9 Pin description of RS 232 and signals.
âDepartment of Electronics & Telecommunication Engineering, MCERC,Nasik.2013-14â
Page 20
21. ADVANCED VEHICLE SECURITY SYSTEM
Features
ī A selection of RS232, 3.3V or 5V UART signal levels.
ī 128 byte transmit buffer, 256 byte receive buffer
ī Serial port speed up to 1Mbps (RS232 levels) or 3Mbps
ī Parity: None, Even, Odd
ī Data bits: 7, 8
ī Operating temperature of -40°C to +85°C.
ī USB Interface 12Mbps USB 2.0.
Fig 3.10 Interfacing of RS 232 with PC.
RS-232 Maximum Cable Length
The maximum cable length for RS-232 is 50ft, but in practice depends on baud
rate, cable specific capacitance and ambient noise. The table below contains some
rules-of-thumb from experiments done by Texas Instruments years ago.
âDepartment of Electronics & Telecommunication Engineering, MCERC,Nasik.2013-14â
Page 21
22. ADVANCED VEHICLE SECURITY SYSTEM
Baud rate
Maximum range / cable length
19200
50ft
9600
500ft
4800
1000ft
2400
3000ft
Table 3.1 Baud rate required for maximum cable length.
3.1.5 MICROCONTROLLER (AT89S52)
A microcontroller is a small computer on a single integrated circuit
containing a processor core, memory, and programmable I/O peripherals.
Fig3.11 Microcontroller AT89S52
The
AT89S52
is
a
low-power,
high-performance
CMOS
8-bit
microcontroller with 8K bytes of in-system programmable Flash memory.
The device is manufactured using Atmelâs high-density nonvolatile
memory technology and is compatible with the industry standard80C51
instruction set and pin out. The on-chip Flash allows the program memory
to be reprogrammed in-system or by a conventional nonvolatile memory
programmer. By combining a versatile 8-bit CPU with in-system
programmable Flash on a monolithic chip, the Atmel AT89S52 is a
âDepartment of Electronics & Telecommunication Engineering, MCERC,Nasik.2013-14â
Page 22
23. ADVANCED VEHICLE SECURITY SYSTEM
powerful microcontroller which provides a highly-flexible and costeffective solution to many embedded control applications. The AT89S52
provides the following standard features: 8K bytes of Flash, 256 bytes of
RAM, 32 I/O lines, Watchdog timer, two data pointers, three 16-bit
timer/counters, a six-vector two-level interrupt architecture, a full duplex
serial port, on-chip oscillator, and clock circuitry. In addition, the
AT89S52 is designed with static logic for operation down to zero
frequency and supports two software selectable power saving modes. The
Idle Mode stops the CPU while allowing the RAM, timer/counters, serial
port, and interrupt system to continue functioning. The Power-down mode
saves the RAM con-tents but freezes the oscillator, disabling all other chip
functions until the next interrupt or hardware reset.
Features
ī Compatible with MCS51 Products
ī 8K Bytes of In-System Programmable (ISP) Flash Memory
ī Endurance: 10,000 Write/Erase Cycles
ī 4.0V to 5.5V Operating Range
ī Fully Static Operation: 0 Hz to 33 MHz
ī Three-level Program Memory Lock
ī 256 x 8-bit Internal RAM
ī 32 Programmable I/O Lines
ī Three 16-bit Timer/Counters
ī Eight Interrupt Sources
ī Full Duplex UART Serial Channel
ī Low-power Idle and Power-down Modes
ī Interrupt Recovery from Power-down Mode
ī Watchdog Timer
ī Dual Data Pointer
ī Power-off Flag
ī Fast Programming Time
ī Flexible ISP Programming (Byte and Page Mode)
âDepartment of Electronics & Telecommunication Engineering, MCERC,Nasik.2013-14â
Page 23
24. ADVANCED VEHICLE SECURITY SYSTEM
Pin Description
ī VCC Supply voltage.
ī GND Ground.
ī Port 0 Port 0 is an 8-bit open drain bidirectional I/O port. As an
output port, each pin can sink eight TTL inputs. When 1s are
written to port 0 pins, the pins can be used as high-impedance
inputs. Port 0 can also be configured to be the multiplexed loworder address/data bus during accesses to external program and
data memory. In this mode, P0 has internal pull-ups. Port 0 also
receives the code bytes during Flash programming and outputs the
code bytes during program verification. External pull-ups are
required during program verification.
ī Port 1 Port 1 is an 8-bit bidirectional I/O port with internal pullups. The Port 1 output buffers can sink/source four TTL inputs.
When 1s are written to Port 1 pins, they are pulled high by the
internal pull-ups and can be used as inputs. As inputs, Port 1 pins
that are externally being pulled low will source current (IIL)
because of the internal pull-ups. In addition, P1.0 and P1.1 can be
configured to be the timer/counter 2 external count input (P1.0/T2)
and the timer/counter 2 trigger input (P1.1/T2EX), respectively, as
shown in the following table. Port 1 also receives the low-order
address bytes during Flash programming and verification.
ī Port 2 Port 2 is an 8-bit bidirectional I/O port with internal pullups. The Port 2 output buffers can sink/source four TTL inputs.
When 1s are written to Port 2 pins, they are pulled high by the
internal pull-ups and can be used as inputs. As inputs, Port 2 pins
that are externally being pulled low will source current (IIL)
because of the internal pull-ups. Port 2 emits the high-order address
byte during fetches from external program memory and during
accesses to external data memory that use 16-bit addresses (MOVX
@ DPTR). In this application, Port 2 uses strong internal pull-ups
when emitting 1s. During accesses to external data memory that
use 8-bit addresses (MOVX @ RI), Port 2 emits the contents of the
âDepartment of Electronics & Telecommunication Engineering, MCERC,Nasik.2013-14â
Page 24
25. ADVANCED VEHICLE SECURITY SYSTEM
P2 Special Function Register. Port 2 also receives the high-order
address bits and some control signals during Flash programming
and verification.
ī Port 3 Port 3 is an 8-bit bidirectional I/O port with internal pullups. The Port 3 output buffers can sink/source four TTL inputs.
When 1s are written to Port 3 pins, they are pulled high by the
internal pull-ups and can be used as inputs. As inputs, Port 3 pins
that are externally being pulled low will source current (IIL)
because of the pull-ups. Port 3 receives some control signals for
Flash programming and verification. Port 3 also serves the
functions of various special features of the AT89S52, as shown
below
Port Pin Alternate Functions:
P3.0
RXD
Serial input port
P3.1
TXD
Serial output port
P3.2
INT0
External interrupt 0
P3.3
INT1
External interrupt 1
P3.4
T0
Timer 0 external input
P3.5
T1
Timer 0 external input
P3.6
WR
External data memory
write strobe
P3.7
RD
External data memory
write strobe
Table 3.2 Pin configuration table of port 3 of AT89S52
ī RST A high on this pin for two machine cycles while the oscillator
is running resets the device. This pin drives high for 98 oscillator
periods after the Watchdog times out. The DISRTO bit in SFR
AUXR (address 8EH) can be used to disable this feature. In the
default state of bit DISRTO, the RESET HIGH out feature is
enabled.
âDepartment of Electronics & Telecommunication Engineering, MCERC,Nasik.2013-14â
Page 25
26. ADVANCED VEHICLE SECURITY SYSTEM
ī ALE/PROG Address Latch Enable (ALE) is an output pulse for
latching the low byte of the address during accesses to external
memory. This pin is also the program pulse input (PROG) during
Flash programming. In normal operation, ALE is emitted at a
constant rate of 1/6 the oscillator frequency and may be used for
external timing or clocking purposes. Note, however, that one ALE
pulse is skipped during each access to external data memory. If
desired, ALE operation can be disabled by setting bit 0 of SFR
location 8EH. With the bit set, ALE is active only during a MOVX
or MOVC instruction. Otherwise, the pin is weakly pulled high.
Setting the ALE-disable bit has no effect if the microcontroller is in
external execution mode.
ī PSEN Program Store Enable is the read strobe to external program
memory. When the AT89S52 is executing code from external
program memory, PSEN is activated twice each machine cycle,
except that two PSEN activations are skipped during each access to
external data memory.
ī EA/VPP External Access Enable. EA must be strapped to GND in
order to enable the device to fetch code from external program
memory locations starting at 0000H up to FFFFH. Note, however,
that if lock bit 1 is programmed, EA will be internally latched on
reset. EA should be strapped to VCC for internal program
executions. This pin also receives the 12-volt programming enable
voltage (VPP) during Flash programming.
ī XTAL1 Input to the inverting oscillator amplifier and input to the
internal clock operating circuit.
ī XTAL2 Output from the inverting oscillator amplifier.
ī Watchdog Timer (One-time Enabled with Reset-out) The WDT
is intended as a recovery method in situations where the CPU may
be subjected to software upsets. The WDT consists of a 14-bit
counter and the Watchdog Timer Reset (WDTRST) SFR. The
WDT is defaulted to disable from exiting reset. To enable the
WDT, a user must write 01EH and 0E1H in sequence to the
âDepartment of Electronics & Telecommunication Engineering, MCERC,Nasik.2013-14â
Page 26
27. ADVANCED VEHICLE SECURITY SYSTEM
WDTRST register (SFR location 0A6H). When the WDT is
enabled, it will increment every machine cycle while the oscillator
is running. The WDT timeout period is dependent on the external
clock frequency. There is no way to disable the WDT except
through reset (either hardware reset or WDT overflow reset). When
WDT over-flows, it will drive an output RESET HIGH pulse at the
RST pin.
ī Using the WDT To enable the WDT, a user must write 01EH and
0E1H in sequence to the WDTRST register (SFR location 0A6H).
When the WDT is enabled, the user needs to service it by writing
01EH and 0E1H to WDTRST to avoid a WDT overflow. The 14bit counter overflows when it reaches 16383 (3FFFH), and this will
reset the device. When the WDT is enabled, it will increment every
machine cycle while the oscillator is running. This means the user
must reset the WDT at least every 16383 machine cycles. To reset
the WDT the user must write 01EH and 0E1H to WDTRST.
WDTRST is a write-only register. The WDT counter cannot be
read or written. When WDT overflows, it will generate an output
RESET pulse at the RST pin. The RESET pulse dura-tion is
98xTOSC, where TOSC = 1/FOSC. To make the best use of the
WDT, it should be serviced in those sections of code that will
periodically be executed within the time required to prevent a
WDT reset.
3.1.6 LCD (Liquid Crystal Display)
Liquid crystal Display (LCD) displays temperature of the measured
element, which is calculated by the microcontroller. CMOS technology makes the
device ideal for application in hand held, portable and other battery instruction
with low power consumption.
âDepartment of Electronics & Telecommunication Engineering, MCERC,Nasik.2013-14â
Page 27
28. ADVANCED VEHICLE SECURITY SYSTEM
Features
ī Drive method: 1/16 duty cycle
ī Display size: 16 character * 2 lines
ī Character structure: 5*8 dots.
ī Display data RAM: 80 characters (80*8 bits)
ī Character generate ROM: 192 characters
ī Character generate RAM: 8 characters (64*8 bits)
ī Both display data and character generator RAMs can be read from MPU.
ī Internal automatic reset circuit at power ON.
ī Built in oscillator circuit.
Fig 3.12 LCD display 16X2
âDepartment of Electronics & Telecommunication Engineering, MCERC,Nasik.2013-14â
Page 28
30. ADVANCED VEHICLE SECURITY SYSTEM
3.1.7 RELAY DRIVER (ULN2803)
The eight NPN Darlington connected transistors in this family of arrays are ideally
suited for interfacing between low logic level digital circuitry (such as TTL,
CMOS or PMOS/NMOS) and the higher current/voltage requirements of lamps,
relays, printer hammers or other similar loads for a broad range of computer,
industrial, and consumer applications. All devices feature openâcollector outputs
and freewheeling clamp diodes for transient suppression. The ULN2803 is
designed to be compatible with standard TTL families while the ULN2804 is
optimized for 6 to 15 volt high level CMOS or PMOS.
Features
ī Eight darlington with common emitters.
ī Output current to 500 Ma.
ī Output voltage to 50 V.
ī Integral suppression diodes.
ī Versions for all popular logic families.
ī Output can be paralleled.
ī Inputs pinned opposite outputs to simplify board layout.
Fig 3.14 Internal circuit of relay driver ULN2803
âDepartment of Electronics & Telecommunication Engineering, MCERC,Nasik.2013-14â
Page 30
31. ADVANCED VEHICLE SECURITY SYSTEM
Fig 3.15 Pin description of ULN2803
Description
The ULN2801A-ULN2805A each contains eight Darlington transistors with
common emitters and integral suppression diodes for inductive loads. Each
Darlington features a peak load current rating of 600mA (500mA continuous) and
can withstand at least 50V in the off state. Outputs maybe paralleled for higher
current capability. Five versions are available to simplify interfacing to standard
logic families: the ULN2801A is designed for general purpose applications with a
current limit resistor; the ULN2802A has a 10.5k input resistor and zener for 1425V PMOS; the ULN2803A has a 2.7k input resistor for 5V TTL and CMOS; the
ULN2804A has a 10.5k input resistor for 6-15V CMOS and the ULN2805A is
designed to sink a minimum of 350mA for standard and Schottky TTL where
âDepartment of Electronics & Telecommunication Engineering, MCERC,Nasik.2013-14â
Page 31
32. ADVANCED VEHICLE SECURITY SYSTEM
higher output current is required. All types are supplied in an 18-lead plastic DIP
with a copper lead from and feature the convenient input opposite-output pin out
to simplify board layout.
3.1.8 VIBRATION SENSOR
Fig 3.16 Vibration sensor
Features
ī Supply voltage : 12V DC.
ī Baud rate : 9600.
ī Data bits : 8.
ī SMS storage : SIM card.
ī Operating temperature : -20 to 55 â .
ī GPRS data: Uplink transfer 42.8kbps.
Downlink transfer 85.6kbps.
ī External antenna : Connected via 50 ohm antenna connector.
3.1.9 POWER SUPPLY
The ac voltage, typically 220V rms, is connected to a transformer, which steps
that ac voltage down to the level of the desired dc output. A diode rectifier then
provides a full-wave rectified voltage that is initially filtered by a simple capacitor
filter to produce a dc voltage. This resulting dc voltage usually has some ripple or
ac voltage variation.
âDepartment of Electronics & Telecommunication Engineering, MCERC,Nasik.2013-14â
Page 32
33. ADVANCED VEHICLE SECURITY SYSTEM
A regulator circuit removes the ripples and also remains the same dc value even if
the input dc voltage varies, or the load connected to the output dc voltage changes.
This voltage regulation is usually obtained using one of the popular voltage
regulator IC units.
VOLTAGE REGULATOR IC 7805
Fig 3.17 Voltage regulator IC 7805
Voltage regulators comprise a class of widely used ICs. Regulator IC units contain
the circuitry for reference source, comparator amplifier, control device, and
overload protection all in a single IC. IC units provide regulation of either a fixed
positive voltage, a fixed negative voltage, or an adjustable set voltage. The
regulators can be selected for operation with load currents from hundreds of milli
amperes to tens of amperes, corresponding to power ratings from milli watts to
tens of watts.
Fig 3.18 Circuit diagram of power supply
âDepartment of Electronics & Telecommunication Engineering, MCERC,Nasik.2013-14â
Page 33
34. ADVANCED VEHICLE SECURITY SYSTEM
When four diodes are connected as shown in figure, the circuit is called as bridge
rectifier. The input to the circuit is applied to the diagonally opposite corners of
the network, and the output is taken from the remaining two corners. Let us
assume that the transformer is working properly and there is a positive potential,
at point A and a negative potential at point B. the positive potential at point A will
forward bias D3 and reverse bias D4. The negative potential at point B will
forward bias D1 and reverse D2. At this time D3 and D1 are forward biased and
will allow current flow to pass through them; D4 and D2 are reverse biased and
will block current flow. The path for current flow is from point B through D1, up
through RL, through D3, through the secondary of the transformer back to point
B. this path is indicated by the solid arrows. Waveforms (1) and (2) can be
observed across D1 and D3.One-half cycle later the polarity across the secondary
of the transformer reverse, forward biasing D2 and D4 and reverse biasing D1 and
D3. Current flow will now be from point A through D4, up through RL, through
D2, through the secondary of T1, and back to point A. This path is indicated by
the broken arrows. Waveforms (3) and (4) can be observed across D2 and D4. The
current flow through RL is always in the same direction. In flowing through RL
this current develops a voltage corresponding to that shown waveform (5). Since
current flows through the load (RL) during both half cycles of the applied voltage,
this bridge rectifier is a full-wave rectifier.
Fig 3.19 Waveforms of half wave and full wave rectification
âDepartment of Electronics & Telecommunication Engineering, MCERC,Nasik.2013-14â
Page 34
35. ADVANCED VEHICLE SECURITY SYSTEM
Chapter 4
CIRCUIT DIAGRAM
Fig 4.1 Simulation of power supply
Fig 4.2 Circuit diagram of the system
âDepartment of Electronics & Telecommunication Engineering, MCERC,Nasik.2013-14â
Page 35
36. ADVANCED VEHICLE SECURITY SYSTEM
Chapter 5
REQUIRED SOFTWARE
5.1 Embedded âCâ
Embedded âCâ is a set of language extensions for the C Programming language
by the C Standards committee to address commonality issues that exist between C
extensions for different embedded systems. Historically, embedded C
programming requires nonstandard extensions to the C language in order to
support exotic features such as fixed-point arithmetic, multiple distinct memory
banks, and basic I/O operations.
In 2008, the C Standards Committee extended the C language to address these
issues by providing a common standard for all implementations to adhere to. It
includes a number of features not available in normal C, such as, fixed-point
arithmetic, named address spaces, and basic I/O hardware addressing.
Embedded âCâ use most of the syntax and semantics of standard C, e.g main()
function, variable definition, data type declaration, conditional statements (if,
switch. case), loops (while, for), functions, arrays and strings, structures and
union, bit operations, macros, unions, etc.
The âCâ Programming Language was originally developed for and implemented
on the UNIX operating system, by Dennis Ritchie in 1971.
One of the best features of C is that it is not tied to any particular hardware or
system. This makes it easy for a user to write programs that will run without any
changes on practically all machines. C is often called a middle-level computer
language as it combines the elements of high-level languages with the
functionalism of assembly language. To produce the most efficient machine code,
the programmer must not only create an efficient high level design, but also pay
attention to the detailed implementation.
âDepartment of Electronics & Telecommunication Engineering, MCERC,Nasik.2013-14â
Page 36
37. ADVANCED VEHICLE SECURITY SYSTEM
5.1.1 Characteristic of an Embedded âCâ programming environment
ī Limited ROM.
ī Limited RAM.
ī Limited stack space.
ī Hardware oriented programming.
ī Critical timing (Interrupt Service Routines, tasks)
ī Many different pointer kinds (far / near / rom / uni).
ī Special keywords and tokens (@, interrupt, tiny).
5.2 Proteus v7.6
Proteus PCB design combines the ISIS schematic capture and ARES PCB
layout programs to provide a powerful, integrated and easy to use suite of tools for
professional PCB Design. All Proteus PCB design products include an integrated
shape based auto router and a basic SPICE simulation capability. More advanced
routing modes are included in Proteus PCB Design Level 2 and higher whilst
simulation capabilities can be enhanced by purchasing the Advanced
Simulation option and/or micro-controller simulation capabilities.
ISIS (Intelligent Schematic Input System) Schematic Capture
ISIS lies at the heart of the Proteus system, and is far more than just another
schematics package. It combines a powerful design environment with the ability
to define most aspects of the drawing appearance. Whether your requirement is
the rapid entry of complex designs for simulation and PCB layout, or the creation
of attractive schematics for publication, ISIS is the tool for the job.
Features
ī Runs on Windows 98/Me/2k/XP and later.
ī Automatic wire routing and dot placement/removal.
ī Powerful tools for selecting objects and assigning their properties.
âDepartment of Electronics & Telecommunication Engineering, MCERC,Nasik.2013-14â
Page 37
38. ADVANCED VEHICLE SECURITY SYSTEM
ī Full support for buses including component pins, inter-sheet terminals,
module ports and wires.
ī Bill of Materials and Electrical Rules Check report.
ī Net list outputs to suit all popular PCB layout tools.
ARES PCB Layout Software
ARES (Advanced Routing and Editing Software) forms the PCB layout module of
the PROTEUS system and offers net list based PCB design complete with a suite
of high performance design automation tools. The latest version is compatible
with Windows 98/Me/2k/XP and later. It includes a brand new Auto-Placer,
improved Auto-Routing, automatic Gate-Swap optimization and even more
powerful support for power planes.
5.2.1 Features
ī 32 bit high-precision database giving a linear resolution of 10nm, an
angular resolution of 0.1° and a maximum board size of +/- 10m. ARES
supports 16 copper layers, two silk screens, four mechanical layers plus
solder resist and paste mask layer.
ī Net list based integration with ISIS schematic capture, including the ability
to specify routing information on the schematic.
ī Automatic Back-Annotation of component renumbering, pin-swap and
gate-swap changes.
ī Physical and Connectivity Rule Check reports.
ī Powerful route editing features including topological route editing, auto
track necking and curved trace support.
ī 2D Drawing with Symbol Library.
ī Comprehensive package libraries for both through hole and surface mount
parts including SM782 standard SMT footprints. There are now over 1000
parts in total in the package library.
ī Unlimited Pad/Trace/Via Styles.
ī Full metric and SMT support. This includes all dialogue form fields as
well as the coordinate display and grid settings.
âDepartment of Electronics & Telecommunication Engineering, MCERC,Nasik.2013-14â
Page 38
39. ADVANCED VEHICLE SECURITY SYSTEM
ī Output to a wide range of printers and plotters. Also output in DXF, EPS,
WMF and BMP graphics formats - to file or clipboard where appropriate.
ī Built in Gerber Viewer - this enables you to check your Gerber output files
before spending money on bureau fees or board manufacture.
5.3 EAGLE v4.1
EAGLE is a powerful graphics editor for designing PC-board layouts and
schematics.
5.3.1 Features
ī Maximum drawing area 64 x 64 inches (about 1600 x 1600 mm).
ī Resolution 1/10.000 mm (0.1 microns).
ī Up to 255 layers, user definable colors.
ī Command files (Script files).
ī C-like User Language for data import and export.
ī Simple library editing.
ī Easy generation of new package variants from any library by Drag &
Drop.
ī Automatic backup function.
Layout Editor
ī Full SMD support.
ī Rotation of elements in arbitrary angles (0.1-degree steps).
ī Design Rule Check for board layouts (checks e.g. overlaps, measures of
pads or tracks).
ī Copper pouring (ground plains) package variants support.
Schematic Module
ī Up to 99 sheets per schematic.
ī Simple copying of parts.
ī Online-Forward & Back Annotation between schematic and board.
ī Automatic board generation.
âDepartment of Electronics & Telecommunication Engineering, MCERC,Nasik.2013-14â
Page 39
40. ADVANCED VEHICLE SECURITY SYSTEM
Chapter 6
CONCLUSION
By the realization of the above proposed system one can learn many aspects of a
digital electronics circuit. It gives the complete knowledge of designing
microcontroller based system and developing embedded software. Thus
fingerprint identification enhances the security of a vehicle and makes it possible
only for some selected people to start the car. Thus by implementing this
relatively cheap and easily available system on a car one can ensure much greater
security and exclusivity than that offered by a conventional lock and key.
The reliability of any automatic fingerprint system strongly relies on the precision
obtained in the minutia extraction process. A number of factors are detrimental to
the correct location of minutia. Among them, poor image quality is the most
serious one. In this project, we have combined many methods to build a minutia
extractor and a minutia matcher. The proposed alignment-based matching
algorithm is capable of finding the correspondences between minutiae without
resorting to exhaustive research.
There is a scope of further improvement in terms of efficiency and accuracy which
can be achieved by improving the hardware to capture the image or by improving
the image enhancement techniques. So that the input image to the thinning stage
could be made better so as to improve the future stages.
âDepartment of Electronics & Telecommunication Engineering, MCERC,Nasik.2013-14â
Page 40
41. ADVANCED VEHICLE SECURITY SYSTEM
Chapter 7
SUMMARY
7.1 Advantages
ī Highly reliable.
ī Unique.
ī Processing speed is fast.
ī Economical biometric technology.
ī Less memory space.
ī Easy to use & user friendly.
ī Highly secured than other security systems.
7.2 Disadvantages
ī Distortion due to dirt/dust on the fingertip.
ī Injuries or burns to the fingertips can cause a person's fingerprint to
become unreadable or even eliminated.
ī Failure of network.
7.3 Applications
ī Cars.
ī Motorcycles.
ī Transport Vehicles.
ī Home security systems.
ī Lockers.
ī Attendance system in institutions or offices.
ī ATMâs.
âDepartment of Electronics & Telecommunication Engineering, MCERC,Nasik.2013-14â
Page 41
42. ADVANCED VEHICLE SECURITY SYSTEM
Chapter 8
REFRENCES
[1] Myke Predko, Programming and Customizing the 8051
Microcontroller,
Edition 1999, Tata McGraw-Hill, Page:157-167.
[2] Muhammad Ali Mazidi, Janice Gillispie Mazidi, 8051 Microcontroller and
Embedded Systems, Prentice-Hall, Page:183-193, 236, 243.
[3] Dogan Ibrahim, Microcontroller Projects in C for the 8051, Newnes, Page:29161.
[4]
Kenneth
J.
Ayala,
The
8051
Microcontroller
ARCHITECTURE,
PROGRAMMING and APPLICATIONS, WEST PUBLISHING COMPANY,
Page:131-197.
[5] Michael J. Pont, Embedded C, Edition 2002, Addison Wesley, Page: 5787,217.
[6] www.electronicsforu.com
[7] www.electronic-circuits-diagrams.com
[8] www.alldatasheets.com
[9] www.wikipedia.org
âDepartment of Electronics & Telecommunication Engineering, MCERC,Nasik.2013-14â
Page 42